Overview

Building the impenetrable IT environment was always a challenge, even when there were predefined boundaries. Welcome to the new world of computing without boundaries, including a complete mix of personal and business data on company systems. How do you delineate between what is valuable and needs to be protected? McAfee Risk Management solutions focus on the applications and data that must be protected. Customize the security of your personal digital assistants (PDAs) and removable media, secure unstructured data, and handle the complexity and scale that comes with this new generation of computing.

Enable productive use of Web 2.0Use Web 2.0 with confidence within your organization by leveraging strong inbound and outbound filtering of multiple web protocols, including deep inspection of encrypted traffic.

Simplify and improve protectionAutomatically protect data, identify and control critical data, safeguard information sent to third parties, secure your enterprise from the risk of data loss, and prove compliance with less effort, while saving time and money with centralized deployment, management, and reporting.

Network Security

McAfee Network Security Platform is the industry’s most secure network intrusion prevention system (IPS). Backed by McAfee Labs, it protects customers on average 80 days ahead of the threat. It blocks attacks in real time, before they can cause damage, and protects every network-connected device. With Network Security Platform, you can automatically manage risk and enforce compliance — while improving operational efficiency and reducing IT efforts.

Security Management

McAfee ePolicy Orchestrator (ePO) is a key component of the McAfee Security Management Platform, and the only enterprise-class software, to provide unified management of endpoint, network, and data security. With end-to-end visibility and powerful automations that slash incident response times, McAfee ePO software dramatically strengthens protection and drives down the cost and complexity of managing risk and security.

Services

Detect and prevent the unauthorized transmission or disclosure of sensitive information. McAfee Foundstone reduces your risk of exposure by identifying sensitive data copied or currently in transit from its original intended container.

Community

Blogs

By Kent Landfield, Director of Standards and Technology Policy, Intel Security, and Malcolm Harkins, Chief Security and Privacy Officer at Intel When the Administration released the Framework for Improving Critical Infrastructure Cybersecurity (the Framework) on February 12, 2014, many of us at Intel and Intel Security were familiar with the details, as we had participated […]

BYOD, BYOA, BYOx. The IT industry is full of acronyms depicting its constant evolution and relationship with the professional world. First came the devices; employees saw the power of personal devices and insisted on using them in the workplace. And so the consumerisation of IT was born. After the devices came the apps. Companies reported […]

There’s been a lot of talk about the value of public-private partnerships in moving the U.S. toward a more robust cyber security posture. And let’s be honest: there’s also been a lot of private sector skepticism about how much the Administration really believed in the concept or how much they would do to make it […]

McAfee is based in Silicon Valley, but we know there’s more to tech than California. We recently joined the National Institute of Standards and Technology to launch the National Cybersecurity Center of Excellence, a joint effort among high-tech business, federal, state and local government and local universities located in Rockville, Md. The goal of the […]

Nothing is as frustrating as when something goes wrong, especially when you have time constraints. NIST has just released Special Publication 800-53, Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations where a few notable items have been added to increase the confidence that security, practices, procedures and architectures of information systems […]